Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Tue, 19 Mar 2002 14:37:18 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Tue, 19 Mar 2002 14:37:01 -0500 Received: from neon-gw-l3.transmeta.com ([63.209.4.196]:21516 "EHLO neon-gw.transmeta.com") by vger.kernel.org with ESMTP id ; Tue, 19 Mar 2002 14:36:46 -0500 Message-ID: <3C979333.6020500@zytor.com> Date: Tue, 19 Mar 2002 11:36:19 -0800 From: "H. Peter Anvin" Organization: Zytor Communications User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.6) Gecko/20011120 X-Accept-Language: en, sv MIME-Version: 1.0 To: Dave Jones CC: linux-kernel@vger.kernel.org Subject: Re: [PATCH] zlib double-free bug In-Reply-To: <15510.25987.233438.112897@argo.ozlabs.ibm.com> <20020319201427.K19346@suse.de> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Dave Jones wrote: > > > For the record - it's not worth bothering with fs/jffs2/zlib.c; if they > > > can corrupt your file system on the medium, why bother with cracking zlib? > > Removable media? > > If attacker has physical access to the media, there are far simpler > ways of corrupting it than zlib exploitation. 8-) > Right, but you don't want someone to insert a removable medium and have the system crash in response. -hpa - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/